Vijay Sivaraman

Orcid: 0000-0001-7985-6765

According to our database1, Vijay Sivaraman authored at least 166 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Network Anatomy and Real-Time Measurement of Nvidia GeForce NOW Cloud Gaming.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

2023
MetaVRadar: Measuring Metaverse Virtual Reality Network Activity.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic Analysis.
IEEE Trans. Netw. Serv. Manag., September, 2023

PEDDA: Practical and Effective Detection of Distributed Attacks on enterprise networks via progressive multi-stage inference.
Comput. Networks, September, 2023

A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques.
ACM Comput. Surv., 2023

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection.
CoRR, 2023

Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity.
CoRR, 2023

2022
Automatic Detection of DGA-Enabled Malware Using SDN and Traffic Behavioral Modeling.
IEEE Trans. Netw. Sci. Eng., 2022

Verifying and Monitoring IoTs Network Behavior Using MUD Profiles.
IEEE Trans. Dependable Secur. Comput., 2022

Estimating Passenger Queue for Bus Resource Optimization Using LoRaWAN-Enabled Ultrasonic Sensors.
IEEE Syst. J., 2022

Monetizing Parking IoT Data via Demand Prediction and Optimal Space Sharing.
IEEE Internet Things J., 2022

Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings.
IEEE Internet Things J., 2022

Combining Device Behavioral Models and Building Schema for Cybersecurity of Large-Scale IoT Infrastructure.
IEEE Internet Things J., 2022

Analyzing Enterprise DNS Traffic to Classify Assets and Track Cyber-Health.
CoRR, 2022

Classifying and tracking enterprise assets via dual-grained network behavioral analysis.
Comput. Networks, 2022

Know Thy Lag: In-Network Game Detection and Latency Measurement.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

Learning-Based Detection of Malicious Hosts by Analyzing Non-Existent DNS Responses.
Proceedings of the IEEE Global Communications Conference, 2022

On the Validity of Internet Speed Test Tools and Broadband Measurement Programs.
Proceedings of the 17th Asian Internet Engineering Conference, 2022

2021
Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks.
IEEE Trans. Netw. Serv. Manag., 2021

Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices.
IEEE Trans. Dependable Secur. Comput., 2021

Optimal Witnessing of Healthcare IoT Data Using Blockchain Logging Contract.
IEEE Internet Things J., 2021

Modeling Live Video Streaming: Real-Time Classification, QoE Inference, and Field Evaluation.
CoRR, 2021

Modeling Classroom Occupancy using Data of WiFi Infrastructure in a University Campus.
CoRR, 2021

Comparing Broadband ISP Performance using Big Data from M-Lab.
CoRR, 2021

FlowFormers: Transformer-based Models for Real-time Network Flow Classification.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

ReCLive: Real-Time Classification and QoE Inference of Live Video Streaming Services.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Software-Defined Multi-domain Tactical Networks: Foundations and Future Directions.
Mobile Edge Computing, 2021

2020
Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning.
IEEE Trans. Netw. Serv. Manag., 2020

Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal Hosts.
IEEE Trans. Netw. Serv. Manag., 2020

Detecting Behavioral Change of IoT Devices Using Clustering-Based Network Traffic Modeling.
IEEE Internet Things J., 2020

Forensic Verification of Health Data From Wearable Devices Using Anonymous Witnesses.
IEEE Internet Things J., 2020

Software-Defined Multi-domain Tactical Networks: Foundations and Future Directions.
CoRR, 2020

IoT Network Security: Requirements, Threats, and Countermeasures.
CoRR, 2020

HazeDose: Design and Analysis of a Personal Air Pollution Inhaled Dose Estimation System using Wearable Sensors.
CoRR, 2020

Evaluating Emergency Evacuation Events Using Building WiFi Data.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

2019
Enhancing Security Management at Software-Defined Exchange Points.
IEEE Trans. Netw. Serv. Manag., 2019

iTeleScope: Softwarized Network Middle-Box for Real-Time Video Telemetry and Classification.
IEEE Trans. Netw. Serv. Manag., 2019

Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics.
IEEE Trans. Mob. Comput., 2019

Experiences With IoT and AI in a Smart Campus for Optimizing Classroom Usage.
IEEE Internet Things J., 2019

Estimating Residential Broadband Capacity using Big Data from M-Lab.
CoRR, 2019

Network-Level Security for the Internet of Things: Opportunities and Challenges.
Computer, 2019

Measuring and Modeling Car Park Usage: Lessons Learned from a Campus Field-Trial.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Inferring Netflix User Experience from Broadband Network Measurement.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

OpenTD: Open Traffic Differentiation in a Post-Neutral World.
Proceedings of the 2019 ACM Symposium on SDN Research, 2019

Detecting Volumetric Attacks on loT Devices via SDN-Based Monitoring of MUD Activity.
Proceedings of the 2019 ACM Symposium on SDN Research, 2019

Assisting Delay and Bandwidth Sensitive Applications in a Self-Driving Network.
Proceedings of the 2019 Workshop on Network Meets AI & ML, 2019

Mapping an Enterprise Network by Analyzing DNS Traffic.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Inferring IoT Device Types from Network Behavior Using Unsupervised Clustering.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Modeling and Monitoring Wi-Fi Calling Traffic in Enterprise Networks Using Machine Learning.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Demo Abstract: A Tool to Detect and Visualize Malicious DNS Queries for Enterprise Networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Real-Time Detection of DNS Exfiltration and Tunneling from Enterprise Networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Smart IoT Devices in the Home: Security and Privacy Implications.
IEEE Technol. Soc. Mag., 2018

iTeleScope: Intelligent Video Telemetry and Classification in Real-Time using Software Defined Networking.
CoRR, 2018

Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report).
CoRR, 2018

Responsive high throughput congestion control for interactive applications over SDN-enabled networks.
Comput. Networks, 2018

Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Combining MUD Policies with SDN for IoT Intrusion Detection.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Real-time detection, isolation and monitoring of elephant flows using commodity SDN system.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Data-driven monitoring and optimization of classroom usage in a smart campus.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

A tool to access and visualize classroom attendance data from a smart campus: demo abstract.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Realizing a Smart University Campus: Vision, Architecture, and Implementation.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Enabling Fast and Slow Lanes for Content Providers Using Software Defined Networking.
IEEE/ACM Trans. Netw., 2017

An experimental study of secret key generation for passive Wi-Fi wearable devices.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

Quantifying the reflective DDoS attack capability of household IoT devices.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Characterizing and classifying IoT traffic in smart cities and campuses.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Implementing Geo-Blocking and Spoofing Protection in Multi-Domain Software Defined Interconnects.
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017

Cloud assisted home networks.
Proceedings of the 2nd Workshop on Cloud-Assisted Networking, 2017

Systematically Evaluating Security and Privacy for Consumer IoT Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Enhancing visibility into home networks using SDN.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

Experimental evaluation of cybersecurity threats to the smart-home.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
SDN APIs and Models for Two-Sided Resource Management in Broadband Access Networks.
IEEE Trans. Netw. Serv. Manag., 2016

An economic model for a new broadband ecosystem based on fast and slow lanes.
IEEE Netw., 2016

Greening Router Line-Cards via Dynamic Management of Packet Memory.
IEEE J. Sel. Areas Commun., 2016

Perspectives on Net Neutrality and Internet Fast-Lanes.
Comput. Commun. Rev., 2016

Smart-Phones Attacking Smart-Homes.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Vulnerability analysis of iPhone 6.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

SVR based dense air pollution estimation model using static and wireless sensor network.
Proceedings of the 2016 IEEE SENSORS, Orlando, FL, USA, October 30 - November 3, 2016, 2016

TeleScope: Flow-Level Video Telemetry Using SDN.
Proceedings of the Fifth European Workshop on Software-Defined Networks, 2016

A Software-Defined Flexible Inter-Domain Interconnect Using ONOS.
Proceedings of the Fifth European Workshop on Software-Defined Networks, 2016

Managing home routers from the cloud using Software Defined Networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Low-cost flow-based security solutions for smart-home IoT devices.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

Timestamp integrity in wearable healthcare devices.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
A Survey of Securing Networks Using Software Defined Networking.
IEEE Trans. Reliab., 2015

Greening Residential Wi-Fi Networks under Centralized Control.
IEEE Trans. Mob. Comput., 2015

Comparing edge and host traffic pacing in small buffer networks.
Comput. Networks, 2015

Network-level security and privacy control for smart-home IoT devices.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Broadband fast-lanes with two-sided control: Design, evaluation, and economics.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Third-party customization of residential Internet sharing using SDN.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Measuring broadband performance using M-Lab: Why averages tell a poor tale.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Pricing user-sanctioned dynamic fast-lanes driven by content providers.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Securing the Timestamping of Sensor Data from Wearable Healthcare Devices.
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015

2014
Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices.
IEEE Trans. Mob. Comput., 2014

Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2014

Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring.
Future Gener. Comput. Syst., 2014

An experimental power profile of Energy Efficient Ethernet switches.
Comput. Commun., 2014

Comparison of the energy, carbon and time costs of videoconferencing and in-person meetings.
Comput. Commun., 2014

Personalizing the home network experience using cloud-based SDN.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Air Pollution Exposure Estimation and Finding Association with Human Activity using Wearable Sensor Network.
Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, 2014

PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Mobile crowdsourcing older people's opinions to enhance liveability in regional city centres.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Personalising pollution exposure estimates using wearable activity sensors.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Improving air pollution forecast with ubiquitous mobile sensor network.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

Loki: A privacy-conscious platform for crowdsourced surveys.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

An experimental study of security and privacy risks with emerging household appliances.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
PET Protection Optimization for Streaming Scalable Videos With Multiple Transmissions.
IEEE Trans. Image Process., 2013

Enabling a Bufferless Core Optical Network Using Edge-to-Edge Packet-Level FEC.
IEEE Trans. Commun., 2013

An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring.
Ad Hoc Networks, 2013

Edge versus host pacing of TCP traffic in small buffer networks.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

HazeWatch: A participatory sensor system for monitoring air pollution in Sydney.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Virtualizing the access network via open APIs.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

Exposing and mitigating privacy loss in crowdsourced survey platforms.
Proceedings of the 2013 workshop on Student workhop, 2013

Virtualizing national broadband access infrastructure.
Proceedings of the 2013 workshop on Student workhop, 2013

Securing data provenance in body area networks using lightweight wireless link fingerprints.
Proceedings of the TrustED'13, 2013

User control of quality of experience in home networks using SDN.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
Architecting a national optical fiber open-access network: The Australian Challenge.
IEEE Netw., 2012

Improving the efficiency of anonymous routing for MANETs.
Comput. Commun., 2012

Zero reconciliation secret key generation for body-worn health monitoring devices.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Authentication of lossy data in body-sensor networks for healthcare monitoring.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Decorrelating secret bit extraction via channel hopping in body area networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Complete life-cycle assessment of the energy/CO2 costs of videoconferencing vs face-to-face meetings.
Proceedings of the IEEE Online Conference on Green Communications, 2012

An energy consumption model for Energy Efficient Ethernet switches.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

2011
Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers.
IEEE/ACM Trans. Netw., 2011

Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Environmental context aware trust in mobile P2P networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Adapting router buffers for energy efficiency.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

Improving secret key generation performance for on-body devices.
Proceedings of the 6th International Conference on Body Area Networks, 2011

2010
Optimal PET Protection for Streaming Scalably Compressed Video Streams With Limited Retransmission Based on Incomplete Feedback.
IEEE Trans. Image Process., 2010

Secure key loss recovery for network broadcast in single-hop wireless sensor networks.
Ad Hoc Networks, 2010

Experimental study of mobility in the soccer field with application to real-time athlete monitoring.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Modeling signal strength of body-worn devices.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Experiments with wireless sensor networks for real-time athlete monitoring.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Enabling a Bufferless Core Network Using Edge-to-Edge Packet-Level FEC.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

TARo: Trusted Anonymous Routing for MANETs.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Packet pacing in small buffer optical packet switched networks.
IEEE/ACM Trans. Netw., 2009

Sharing small optical buffers between real-time and TCP traffic.
Opt. Switch. Netw., 2009

Hierarchical time-sliced optical burst switching.
Opt. Switch. Netw., 2009

Transmission Power Control in Body Area Sensor Networks for Healthcare Monitoring.
IEEE J. Sel. Areas Commun., 2009

Perspectives on router buffer sizing: recent results and open problems.
Comput. Commun. Rev., 2009

A Per-Hop Security Scheme for Highly Dynamic Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Considerations for Sizing Buffers in Optical Packet Switched Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Rate and End-to-End Delay Control for Multicast and Unicast Flows.
Proceedings of IEEE International Conference on Communications, 2009

2008
Secure multi-hop network programming with multiple one-way key chains.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

A key loss recovery scheme for secure broadcasts in wireless sensor networks.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Routers With Very Small Buffers: Anomalous Loss Performance for Mixed Real-Time and TCP Traffic.
Proceedings of the 16th International Workshop on Quality of Service, 2008

Experiments in Adaptive Power Control for Truly Wearable Biomedical Sensor Devices.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Adapting radio transmit power in wireless body area sensor networks.
Proceedings of the 3rd International ICST Conference on Body Area Networks, 2008

Algorithms for Transmission Power Control in Biomedical Wireless Sensor Networks.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Confidential and Secure Broadcast in Wireless Sensor Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

A Dynamic Stateful Multicast Firewall.
Proceedings of IEEE International Conference on Communications, 2007

2006
Deterministic end-to-end delay guarantees with rate controlled EDF scheduling.
Perform. Evaluation, 2006

Packet Pacing in Short Buffer Optical Packet Switched Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

An Experimental Study of Router Buffer Sizing for Mixed TCP and Real-Time Traffic.
Proceedings of the 14th IEEE International Conference on Networks, 2006

2004
Survey on network mobility support.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

2001
End-to-End Statistical Delay Service under GPS and EDF Scheduling: A Comparison Study.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

2000
A reservation protocol for broadcast WDM networks and stability analysis.
Comput. Networks, 2000

Providing End-to-End Statistical Delay Guarantees with Earliest Deadline First Scheduling and Per-Hop Traffic Shaping.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
Statistical Analysis of Delay Bound Violations at an Earliest Deadline First (EDF) Scheduler.
Perform. Evaluation, 1999

1998
Graphical Basis Partitions.
Graphs Comb., 1998

Controlled Multimedia Wireless Link Sharing via Enhanced Class-Based Queueing with Channel-State-Dependent Packet Scheduling.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

1997
Packet scheduling in broadcast WDM networks with arbitrary transceiver tuning latencies.
IEEE/ACM Trans. Netw., 1997

HiPeR-<i>l</i>: High Performance Reservation Protocol with <i>l</i>ook-Ahead for Broadcast WDM Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
On the Design of Optimal TDM Schedules for Broadcast WDM Networks.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996


  Loading...